¿¨°Í˹»ù·¢Ã÷ÒÁÀÊAPT×éÖ¯OilrigʹÓÃDoHÇÔÈ¡ÍøÂçÖÐÊý¾Ý£»£»£»£»£»£»ÐÂEtherOops¹¥»÷ʹÓÃÒÔÌ«ÍøµçÀÂÕë¶ÔÆóÒµÄÚÍøÖÐ×°±¸
Ðû²¼Ê±¼ä 2020-08-061.¿¨°Í˹»ù·¢Ã÷ÒÁÀÊAPT×éÖ¯OilrigʹÓÃDoHÇÔÈ¡ÍøÂçÖÐÊý¾Ý
¿¨°Í˹»ù·¢Ã÷£¬£¬£¬£¬£¬ÒÁÀÊAPT×éÖ¯Oilrig£¨APT34£©Ê¹ÓÃDNS-over-HTTPS£¨DoH£©ÐÒé´Ó±»ÈëÇÖµÄÍøÂçÖÐÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¿£¿£¿£¿£¿£¿¨°Í˹»ùµÄ¶ñÒâÈí¼þÆÊÎöʦVincente DiazÌåÏÖ£¬£¬£¬£¬£¬Oilrig×îÏÈʹÓÃDNSExfiltrator¾ÙÐй¥»÷£¬£¬£¬£¬£¬Æä¿ÉÒÔͨ¹ýÍøÂçÊý¾Ý²¢½«ÆäÒþ²ØÔڷDZê×¼ÐÒéÖУ¬£¬£¬£¬£¬´Ó¶ø½¨ÉèÒþ²ØµÄͨѶͨµÀ£¬£¬£¬£¬£¬OilrigÒ»Ö±ÔÚʹÓÃDNSExfiltratorÔÚÄÚ²¿ÍøÂçÖкáÏòÒÆ¶¯²¢ÍµÈ¡Êý¾Ý¡£¡£¡£¡£OilrigÊÇÊ׸öʹÓÃDoHµÄAPT×éÖ¯£¬£¬£¬£¬£¬¸Ã×éÖ¯ÔÀ´Ò²Éæ×ã¹ý»ùÓÚDNSµÄÉøÍ¸ÊÖÒÕ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/iranian-hacker-group-becomes-first-known-apt-to-weaponize-dns-over-https-doh/#ftag=RSSbaffb68
2.WastedLockerʹÓÃWindowsÄÚ´æÖÎÀí¹¦Ð§ÌÓ±Üɱ¶¾Èí¼þ¼ì²â
ÀÕË÷Èí¼þWastedLockerʹÓÃWindowsÄÚ´æÖÎÀí¹¦Ð§ÌÓ±Üɱ¶¾Èí¼þµÄ¼ì²â¡£¡£¡£¡£ÎªÁËÈÆ¹ý·´ÀÕË÷Èí¼þ½â¾ö¼Æ»®µÄ¼ì²â£¬£¬£¬£¬£¬WastedLocker»áʹÓÃÒ»¸öÀú³ÌÀ´·¿ªÒ»¸öÎļþ£¬£¬£¬£¬£¬²¢½«Æä¶ÁÈ¡µ½Windows Cache ManagerÖУ¬£¬£¬£¬£¬È»ºó¹Ø±ÕÔʼÎļþ¡£¡£¡£¡£ÓÉÓÚÊý¾ÝÏÖÔÚ´æ´¢ÔÚWindows»º´æÖÎÀíÆ÷ÖУ¬£¬£¬£¬£¬Òò´ËWastedLocker½«¼ÓÃÜ»º´æÖеÄÎļþÄÚÈÝ¡£¡£¡£¡£ÓÉÓÚWindows»º´æÖÎÀíÆ÷×÷ΪϵͳÀú³ÌÔËÐУ¬£¬£¬£¬£¬Çå¾²Èí¼þ½«ÒÔΪÕâÊÇÕýµ±µÄWindowsÀú³Ì¼ÓÃÜÊý¾Ý¡£¡£¡£¡£¸ÃÒªÁìÓÐÓõØÈƹýÁËÀÕË÷Èí¼þ±£»£»£»£»£»£»¤Ä£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬²¢ÔÊÐíWastedLocker¼ÓÃÜËùÓÐÎļþ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/wastedlocker-ransomware-abuses-windows-feature-to-evade-detection/
3.ÐÂEtherOops¹¥»÷ʹÓÃÒÔÌ«ÍøµçÀ£¬£¬£¬£¬£¬Õë¶ÔÆóÒµÄÚÍøÖÐ×°±¸
ÎïÁªÍøÑо¿»ú¹¹ArmisµÄÑо¿Ö°Ô±·¢Ã÷й¥»÷·½·¨EtherOops£¬£¬£¬£¬£¬¸ÃÊÖÒÕʹÓÃÓйÊÕϵÄÒÔÌ«ÍøµçÀ£¬£¬£¬£¬£¬¿ÉÓÃÓÚ¹¥»÷ÆóÒµÄÚ²¿ÍøÂçÖеÄ×°±¸¡£¡£¡£¡£EtherOops»ù±¾ÉÏÊÇÖð°ü¹¥»÷£¬£¬£¬£¬£¬ÓйÊÕϵĵçÀ£¨ÒªÃ´ÊÇÓÉÓÚ²»ÍêÉÆµÄµçÀ£¬£¬£¬£¬£¬ÒªÃ´ÊÇÓÉÓÚ¶ñÒâ×ÌÈŹ¥»÷£©½«Ôâµ½µç×Ó×ÌÈÅ£¬£¬£¬£¬£¬²¢·×ªÏÖʵÊý¾Ý°üÖеıÈÌØ£¬£¬£¬£¬£¬Öð²½ÆÆËðÍâ¿Ç£¬£¬£¬£¬£¬Ê¹ÄÚ²¿ÓÐÓøºÔØ´¦Óڻ״̬¡£¡£¡£¡£EtherOops¹¥»÷Àֳɺ󣬣¬£¬£¬£¬¿ÉÖ±½Ó´ÓInternetÉøÍ¸ÍøÂ磬£¬£¬£¬£¬ÉøÍ¸À´×ÔDMZÍø¶ÎµÄÄÚ²¿ÍøÂ磬£¬£¬£¬£¬²¢ÔÚÄÚ²¿ÍøÂçµÄ¸÷¸ö²¿·ÖÖ®¼äºáÏòÒÆ¶¯¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-etheroops-attack-takes-advantage-of-faulty-ethernet-cables/
4.¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼COVID-19¶ÔÈ«ÇòÍøÂç·¸·¨Ó°ÏìµÄ±¨¸æ
¹ú¼ÊÐ̾¯×éÖ¯£¨Interpol£©Ðû²¼Á˹ØÓÚCOVID-19¶ÔÈ«ÇòÍøÂç·¸·¨µÄÓ°ÏìµÄ±¨¸æ¡£¡£¡£¡£±¨¸æÌåÏÖ£¬£¬£¬£¬£¬ÀÕË÷Èí¼þLockBitÏÖÔÚ½«ÃÀ¹úÖÐÐÍÆóÒµ×÷ΪÖ÷Òª¹¥»÷Ä¿µÄ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Æ¾Ö¤ËûÃÇµÄÆÊÎö£¬£¬£¬£¬£¬CERBER¡¢NetWalkerºÍRyukÊÇ×î½ü·¢Ã÷µÄ¶¥¼¶ÀÕË÷Èí¼þ¼Ò×壬£¬£¬£¬£¬ËûÃÇÒ»Ö±Ò»Ö±Éú³¤ÒÔ×îºéÁ÷ƽµØÌá¸ßµ¥´Î¹¥»÷µÄΣº¦¼°ÊÕÒæ¡£¡£¡£¡£Interpol½¨Ò鹫˾ºÍ×éÖ¯¼á³ÖÆäÈí¼þºÍÓ²¼þΪ×îÐÂ״̬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÍÑ»ú´æ´¢×°±¸±¸·ÝÆäÊý¾Ý£¬£¬£¬£¬£¬ÒÔ±ÜÃâÀÕË÷Èí¼þ¶ÔÊý¾Ý¾ÙÐлá¼ûºÍ¼ÓÃÜ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/interpol-lockbit-ransomware-attacks-affecting-american-smbs/
5.Check Point±¨¸æ£¬£¬£¬£¬£¬GoogleºÍAmazonΪ´¹ÂÚ¹¥»÷Ö÷Ҫð³äÄ¿µÄ
Check PointÐû²¼ÁËÆ·ÅÆÍøÂç´¹ÂÚ±¨¸æ£¬£¬£¬£¬£¬·¢Ã÷GoogleºÍAmazonÎªÆ·ÅÆÍøÂç´¹ÂÚ¹¥»÷Ö÷Ҫð³äÄ¿µÄ¡£¡£¡£¡£ÔÚÆ·ÅÆÍøÂç´¹ÂÚ¹¥»÷ÖУ¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýʹÓÃÏàËÆµÄÓòºÍURLÀ´Ã°³ä×ÅÃûÆ·ÅÆµÄ¹Ù·½ÍøÕ¾£¬£¬£¬£¬£¬Í¨³£»£»£»£»£»£»¹»áʹÓÃÓëÔÊ¼ÍøÕ¾ÏàËÆµÄÍøÒ³¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬¹È¸è£¨13£¥£©ºÍÑÇÂíÑ·£¨13£¥£©Ò»Æð×é³ÉÁׯÃÀ๥»÷µÄËÄ·ÖÖ®Ò»¡£¡£¡£¡£½ÓÏÂÀ´ÊÇWhatsApp£¨9£¥£©ºÍFacebook£¨9£¥£©£¬£¬£¬£¬£¬Æä´ÎÊÇMicrosoft£¨7£¥£©¡¢Outlook£¨3£¥£©¡¢Netflix£¨2£¥£©¡¢Apple£¨2£¥£©¡¢Huawei£¨2£¥£©ºÍPayPal£¨ 2£¥£©¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/vulnerabilities---threats/google-and-amazon-replace-apple-as-phishers-favorite-brands/d/d-id/1338572?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
6.NSAÐû²¼Ê¹ÓÃIoT×°±¸ºÍÒÆ¶¯Ó¦ÓÃʱ½µµÍλÖøú×ÙΣº¦µÄÖ¸ÄÏ
ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö(NSA)Ðû²¼ÁËÒ»·ÝÖ¸ÄÏ£¬£¬£¬£¬£¬Ö¸µ¼ÈËÃÇÔõÑùÔÚʹÓÃÒÆ¶¯ºÍÎïÁªÍø×°±¸¡¢É罻ýÌåºÍÒÆ¶¯Ó¦ÓóÌÐòʱ¾¡¿ÉÄÜÉÙµØÌ»Â¶Î»ÖÃÐÅÏ¢£¬£¬£¬£¬£¬¸ÃÖ¸ÄÏÖ÷ÒªÕë¶ÔÖ÷ÒªÊÇÕë¶ÔNSSºÍDoDϵͳÓû§¡£¡£¡£¡£ÖÇÄÜÊÖ»úÇå¾²°åµçÄÔµÈ×°±¸»áʹÓÃGPSºÍÎÞÏßÐźÅÀ´È·¶¨Óû§µÄλÖ㬣¬£¬£¬£¬½ûÓÃÕâЩЧÀͽ«´ó´óïÔÌλÖÃÊý¾Ý̻¶µÄ¿ÉÄÜ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬»¹¿ÉÒÔ½ûÓÃÉè±¹ØÁ¬ÄλÖÃЧÀÍÉèÖ㻣»£»£»£»£»µ±²»Ê¹ÓÃ×°±¸Ê±Ê¹Óú½ÐÐģʽ£¬£¬£¬£¬£¬Õâ¿ÉÒÔÈ·±£BTºÍWi-Fi´¦ÓÚ½ûÓÃ״̬£»£»£»£»£»£»¾¡¿ÉÄÜÉÙµØÔÊÐíÓ¦ÓóÌÐòµÄȨÏÞ£»£»£»£»£»£»×î´óÏ޶ȵؽûÓÃ¹ã¸æÈ¨ÏÞ£»£»£»£»£»£»½ûÓÃÔÊÐí¸ú×Ùɥʧ¡¢±»µÁ»òɥʧװ±¸µÄÉèÖ㻣»£»£»£»£»Ê¹ÓÃÄäÃûÐéÄâרÓÃÍø(VPN)×ÊÖúÒþ²ØÎ»Ö㻣»£»£»£»£»¾¡¿ÉÄÜïÔÌ´æ´¢ÔÚÔÆÖеÄλÖÃÐÅÏ¢µÄÊýÄ¿¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/nsa-offers-advice-on-how-to-reduce-location-tracking-risks/